Remove Course Remove Encryption Remove Government Remove Security
article thumbnail

Information Security vs Cyber Security: The Difference

IT Governance

You’ll often see the terms cyber security and information security used interchangeably. In this blog, we explain what information security and cyber security are, the differences between them and how they fit into your data protection practices. What is information security? This is cyber security.

article thumbnail

The GDPR: Requirements for encryption

IT Governance

Six months since the GDPR (General Data Protection Regulation) came into force, pseudonymisation and data encryption remain the only technology measures specifically mentioned in the famously technology-agnostic Regulation. But what exactly is meant by ‘pseudonymisation’ and ‘encryption’? To further protect data, we look to encryption.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

BEST PRACTICES: Why pursuing sound ‘data governance’ can be a cybersecurity multiplier

The Last Watchdog

Related: What we’ve learned from the massive breach of Capitol At RSA 2020 , I learned about how one of the routine daily chores all large organizations perform — data governance — has started to emerge as something of a cybersecurity multiplier. A robust data archiving strategy puts data into tiers, Lahiri says.

article thumbnail

The European Space Agency Launches Hackable Satellite

Schneier on Security

Of course this is hackable: A sophisticated telecommunications satellite that can be completely repurposed while in space has launched. […]. We can assume strong encryption, and good key management. Still, seems like a juicy target for other governments.

article thumbnail

NEW TECH: The march begins to make mobile app security more robust than legacy PC security

The Last Watchdog

Is mobile technology on a course to become more secure than traditional computing? Related: Securing the Internet of Things I’ve been writing about organizations struggling to solve the productivity vs. security dilemma that’s part and parcel of the BYOD craze for some time now. We spoke at Black Hat 2019.

Security 147
article thumbnail

What Are the Cyber Security Challenges of Hybrid Working?

IT Governance

Although employees and employers may rejoice at the flexibility that hybrid working affords, you must understand the cyber security risks associated with it. It ensures that information is encrypted as it travels across networks, mitigating the risk that someone could intercept it. Public networks are vulnerable.

Security 132
article thumbnail

SaaS data security: here’s why enterprises need to focus on this fast-growing challenge now!

Thales Cloud Protection & Licensing

SaaS data security: here’s why enterprises need to focus on this fast-growing challenge now! Of course, no good story is complete without some dark characters. With a larger number of SaaS Apps across multiple cloud platforms to secure, operational errors and their associated risks start to grow. On average, enterprises use 2.3

Cloud 71